HomeLatest NewsCyber SecurityLocky Ransomware Attack: CERT-In issues warning, cybersecurity firm Trend Micro says no incidence reported by Indian customers

Locky Ransomware Attack: CERT-In issues warning, cybersecurity firm Trend Micro says no incidence reported by Indian customers

In the wake of Locky Ransomware attack and the India's Computer Emergency Response Team (CERT) issuing alert across the country, cybersecurity firm Trend Micro has stated that there are no incidence reported by Trend Micro’s customers in India at present.

Preferred Source of Google

In the wake of Locky Ransomware attack and the India’s Computer Emergency Response Team (CERT) issuing alert across the country, firm Trend Micro has stated that there are no incidence reported by Trend Micro’s customers in India at present. Company said that the ransomware is not likely to be on the scale of Wannacry and Petya ransomware, which relies on Microsoft vulnerability in XP. The Japanese firm has also provided precautionary measures on how to stop the Lukitus variant of Locky ransomware from spreading.

“So far, there haven’t been any cases of Locky ransomware reported by our customers in India or across geographies, but we are getting enquiries from customers and Trend Micro’s support team is helping out in resolving them. For addressing this malware, Trend Micro has its protection in place with suspicious and bad URLs being blocked. There are technologies wherein such embedded macros and file scripts can be detected and deleted,” said Sharda Tickoo, Technical Head, Trend Micro India.

Pointing out the differences between other ransomware, she added, “Wannacry and Petya ransomware looks for Microsoft vulnerability to exploit and spread. There were only few machines with Microsoft vulnerability in Windows XP and hence the damage was huge. In this case, is not exploiting any vulnerability, but what it uses is a Visual Basic (VB) / JavaScript encrypts in a document and the chances of this malware getting evaded are high.”

Advertisement
Saksham Bharat 2026
Saksham Bharat 2026
A multi-stakeholder dialogue on skilling gap in Cybersecurity, Data Resilience and AI — and the roadmap to a Saksham Bharat.
Register Now →
VeeamON 2026 Tour India - Mumbai
VeeamON 2026 Tour India - Mumbai
A VeeamON 2026 India Leadership Series Mumbai for senior public sector and government technology leaders.
Register Now →
Cyber Surakshit Uttar Pradesh
Cyber Surakshit Uttar Pradesh
Find out strategies, frameworks and solutions for building a resilient and secure digital ecosystem across Uttar Pradesh.
Register Now →
VeeamON 2026 Tour India - Bengaluru
VeeamON 2026 Tour India - Bengaluru
A VeeamON 2026 India Leadership Series Bengaluru for senior public sector and government technology leaders.
Register Now →
VeeamON 2026 Tour India - Delhi
VeeamON 2026 Tour India - Delhi
A VeeamON 2026 India Leadership Series Delhi for senior public sector and government technology leaders.
Register Now →
Infosec Reimagined
Infosec Reimagined
Infosec Reimagined 2026 is the premier information security summit where top leaders—CISOs, CROs, CIOs, CTOs and risk executives—converge to redefine cyber resilience.
Register Now →
Digital Senate
Digital Senate
Digital Senate is a premier conference uniting government leaders, technologists and innovators to share ideas, success stories and strategies on digital governance, public sector transformation, cybersecurity and emerging technologies in India.
Register Now →
CIO Prism
CIO Prism
CIO Prism unites forward-thinking technology leaders to exchange transformative insights, shape digital strategies, and foster innovation, empowering enterprises to excel in an era of rapid technological change.
Register Now →

On September 3, a warning issued by India’s Computer Emergency Response Team (CERT) on its website said that over 23 million messages and emails have been sent with the ransomware attachment. The spam, CERT stated had common subjects like ‘please print’, ‘documents’, ‘photo’, ‘Images’, ‘scans’ and ‘pictures’. But the subject may vary when it is an instance of phishing.

CERT has advised users to refrain from clicking any suspicious file and back up important data and files should be taken using removable and external devices. It has also curated a list of domains to avoid.

“Since this particular malware arrives through email compressed attachment and through hidden Visual Basic (VB) / JavaScript, we have to ensure that email as a channel is widely protected. We are trying to build a ransomware strategy with two best practices – first is to start with fortifying email defense mechanisms and second is to delete the VB or Java Script if it is not used in machines. There are certain secure configurations which are unnecessary and not running, should be blocked. This particular malware has a tendency of self deletion. It deletes itself with no traces left, once the payload is executed. It encrypts local drives and network shares. The basic hygiene is to try and avoid open network share and to make sure it is protected,” she said.

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Tech Observer Desk
Tech Observer Desk
Tech Observer Desk at TechObserver.in is a team of technology reporters led by a senior editor who brings latest updates and developments from the world of technology.
- Advertisement -
Powered By Veeam Logo
- Advertisement -

Subscribe to our Newsletter

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

India to Lead Global IT Security Standards Body for Two Years

India will chair the Common Criteria Development Board from April 2026, gaining influence over international IT security certification standards recognised by 38 countries.

RELATED ARTICLES